A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Aironet 1540
Subscribe
Aironet 1542d
Subscribe
Aironet 1542i
Subscribe
Aironet 1560
Subscribe
Aironet 1562d
Subscribe
Aironet 1562e
Subscribe
Aironet 1562i
Subscribe
Aironet 1800
Subscribe
Aironet 1800i
Subscribe
Aironet 1810
Subscribe
Aironet 1810w
Subscribe
Aironet 1815
Subscribe
Aironet 1815i
Subscribe
Aironet 1815m
Subscribe
Aironet 1815t
Subscribe
Aironet 1815w
Subscribe
Aironet 2800
Subscribe
Aironet 2800e
Subscribe
Aironet 2800i
Subscribe
Aironet 3800
Subscribe
Aironet 3800e
Subscribe
Aironet 3800i
Subscribe
Aironet 3800p
Subscribe
Aironet 4800
Subscribe
Aironet Access Point Software
Subscribe
Catalyst 9100
Subscribe
Catalyst 9105
Subscribe
Catalyst 9105ax
Subscribe
Catalyst 9105axi
Subscribe
Catalyst 9105axw
Subscribe
Catalyst 9115
Subscribe
Catalyst 9115 Ap
Subscribe
Catalyst 9115ax
Subscribe
Catalyst 9115axe
Subscribe
Catalyst 9115axi
Subscribe
Catalyst 9117
Subscribe
Catalyst 9117 Ap
Subscribe
Catalyst 9117ax
Subscribe
Catalyst 9117axi
Subscribe
Catalyst 9120
Subscribe
Catalyst 9120 Ap
Subscribe
Catalyst 9120ax
Subscribe
Catalyst 9120axe
Subscribe
Catalyst 9120axi
Subscribe
Catalyst 9120axp
Subscribe
Catalyst 9124
Subscribe
Catalyst 9124ax
Subscribe
Catalyst 9124axd
Subscribe
Catalyst 9124axi
Subscribe
Catalyst 9130
Subscribe
Catalyst 9130 Ap
Subscribe
Catalyst 9130ax
Subscribe
Catalyst 9130axe
Subscribe
Catalyst 9130axi
Subscribe
Catalyst Iw6300
Subscribe
Catalyst Iw6300 Ac
Subscribe
Catalyst Iw6300 Dc
Subscribe
Catalyst Iw6300 Dcw
Subscribe
Esw6300
Subscribe
Ios Xe
Subscribe
Wireless Lan Controller Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24235 | A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 26 Oct 2024 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-25T16:02:56.470Z
Reserved: 2022-10-27T00:00:00
Link: CVE-2023-20056
Updated: 2024-08-02T08:57:35.565Z
Status : Modified
Published: 2023-03-23T17:15:14.220
Modified: 2024-11-21T07:40:27.043
Link: CVE-2023-20056
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD